Analysis
-
max time kernel
90s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2023 01:07
Static task
static1
Behavioral task
behavioral1
Sample
utweb.exe
Resource
win7-20220901-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
utweb.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
utweb.exe
-
Size
6.0MB
-
MD5
63d092a0ad3b5d213ed5698911a1ca0a
-
SHA1
e2fb8a51039ff6ec2c4a706893f8db3a9d49763c
-
SHA256
42dfeaa572f29de8cd61082b449b4f1f82b9d33dec128bd8c9bd9fcf38363174
-
SHA512
4a89893db2f2545be9d8f3e752ca626b9274a8fabbcc47654abc8e9baf94089923c26194602bf9bc202d8aaeaf168b89735436362e207d2e372bc098fda6a23b
-
SSDEEP
98304:YJ6HJQJnXH4aoqheAuIxiIc3nvtthPTQg2btYiF7Ajc2VFcSAZ4w7H2:pHJQJnXHZlzc3n7hPcg2biiFIc2Vvub2
Score
1/10
Malware Config
Signatures
-
Modifies registry class 1 IoCs
Processes:
OpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 5000 notepad.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 4056 OpenWith.exe -
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid 4 4 4 4 4 652 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4056 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\utweb.exe"C:\Users\Admin\AppData\Local\Temp\utweb.exe"1⤵
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" "C:\Users\Admin\Desktop\SyncRename.ps1"1⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx